An oversimplified view of Identity, Privacy, and Security is one which presumes that the Mobile World - the cloud, connectivity providers, and services NEED additional characteristics about you to operate efficiently. Those same factors that provide capability also enable tracking and other unwanted intrusions on Internet life. Of course there are additional monitoring and security options for the enterprise, but they add costs to an Enterprise that is already pushing the financial limits of prudent organizations. Effective CIOs will want to balance the ROI of enterprise services outside the company network against the additional security and monitoring costs.
User Identity in a Mobile Ecosystem | remotelyMOBILE